Analysis

  • max time kernel
    140s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    24-06-2024 17:21

General

  • Target

    94bb99babaabe71987c5b623bcdb652ecf651eb2fa915babdf2064ff91641894_NeikiAnalytics.exe

  • Size

    83KB

  • MD5

    1d4db2e23d49791c58c6e95c1a38fec0

  • SHA1

    446353a5463742419cf940d986e424e8cc0011c8

  • SHA256

    94bb99babaabe71987c5b623bcdb652ecf651eb2fa915babdf2064ff91641894

  • SHA512

    defec2c05bacb928398917d2d00adcccd4c7ba983114a58b68be3fff298f496c8fcdae3938e6f650bca2143e4c754e9746a2b5b9b86e5fad5d058f65961c9779

  • SSDEEP

    1536:LJaPJpAz869DUxWB+i4OQ4NR2Kk+aSnfZaG8fcaOCzGquSE0cF+JK:LJ0TAz6Mte4A+aaZx8EnCGVuJ

Score
7/10
upx

Malware Config

Signatures

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Processes

  • C:\Users\Admin\AppData\Local\Temp\94bb99babaabe71987c5b623bcdb652ecf651eb2fa915babdf2064ff91641894_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\94bb99babaabe71987c5b623bcdb652ecf651eb2fa915babdf2064ff91641894_NeikiAnalytics.exe"
    1⤵
      PID:2156

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rifaien2-yB5zbkm5mT4N0bgb.exe

      Filesize

      83KB

      MD5

      b37c915d0835619f38f07b7feaebe7eb

      SHA1

      26c64103e8e2ff0babaef68fe2abd48f372779ea

      SHA256

      38c0feedd352cabb0d178bbf8c1e5454e1d4a0612b17af3c10abf96a3050fd26

      SHA512

      ddf00044e4ac0d0160afae21e77f28afaed1abefc1bfdc76d90b0c46d1ab3ba984e6e7d782dec4944ccf106105fed98f8acee4472367edd846e5a610bc7c9766

    • memory/2156-0-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2156-1-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2156-7-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2156-14-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2156-21-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2156-27-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB